Detecting information leakage in updating XML documents of fine-grained access control

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To provide fine-grained access control to data in an XML document, XML access control policy is defined based on the contents and structure of the document. In this paper, we discuss confidential information leakage problem caused by unsecure-update that modifies contents or structures of the document referred by the access control policy. In order to solve this problem, we propose an algorithm that computes update constraints of a user on some data in the document under access control policy of the user. We also propose an algorithm that decides whether a given update request of a user against an XML document is an unsecure-update under the user's access control policy. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Chatvichienchai, S., & Iwaihara, M. (2006). Detecting information leakage in updating XML documents of fine-grained access control. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4080 LNCS, pp. 286–296). Springer Verlag. https://doi.org/10.1007/11827405_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free